Skip to main content
Log in

Tanimoto Support Vector Regressive Linear Program Boost Based Node Trust Evaluation for Secure Communication in MANET

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Mobile ad hoc network (MANET) is an infrastructure-less and self-configuring where the Mobile Nodes (MN) moved autonomously via the wireless network interfaces within the communication range. With the increase of wireless technology, a dynamic network deals with the security problem about data communication with improved quality of service (QoS) metrics. Due to lack of trusted centralized authority, MANET is susceptible to security attacks. In order to address these issues, an ensemble technique called Tanimoto Support Vector Regression Based Corrective Linear Program Boost Classification (TSVR-CLPBC) is proposed in MANET. The main objective of the proposed method is enhancing secure communication with minimum end-to-end delay and increased packet delivery ratio. At first, Tanimoto kernelized support vector regression is utilized as a weak learner to examine node features namely cooperative communication, residual energy, and history of node. The nodes are classified as trusted or malicious based on the analysis. Then, the Linear Program Boost ensemble classifier utilizes ‘n’ number of weak learners (i.e., base classifier) to discover trusted MN for secure data transmission. The outcomes of weak learners are combined to create strong output of boosted classifier based on weight function. Ensemble classification algorithm discovers the trusted nodes in MANET and data transmission is carried out with the trusted MN to improve the Qos metric performances. Simulation is conducted with different metrics namely packet delivery ratio (PDR), packet loss rate (PLR), end to end (E2E) delay, jitter, and energy consumption (EC). Experimental outcomes evident that TSVR-CLPBC techniques enhance the PDR and lessen the EC, PLR, E2E delay and jitter than the conventional methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Cai, R. J., Li, X. J., & Chong, P. H. J. (2019). An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Transactions on Mobile Computing, 18(1), 42–55.

    Article  Google Scholar 

  2. Shabut, A. M., Kaiser, M. S., Dahal, K. P., & Chen, W. (2018). A multidimensional trust evaluation model for MANETs. Journal of Network and Computer Applications, 123, 32–41.

    Article  Google Scholar 

  3. Khan, M. S., Khan, M. I., Khalid, O., Azim, M., & Javaid, N. (2016). MATF: A multi-attribute trust framework for MANETs. EURASIP Journal on Wireless Communications and Networking, 2016, 1–17.

    Article  Google Scholar 

  4. Vamsi, P. R., & Kant, K. (2017). Generalized trust model for cooperative routing in MANETs. Wireless Personal Communications, 97(3), 4385–4412.

    Article  Google Scholar 

  5. Garg, M. K., Singh, N., & Verma, P. (2018). Fuzzy rule-based approach for design and analysis of a trust-based secure routing protocol for MANETs. Procedia Computer Science, 132, 653–658.

    Article  Google Scholar 

  6. Ahmed, M. N., Abdullah, A. H., Chizari, H., & Kaiwartya, O. (2017). F3TM: Flooding factor based trust management framework for secure data transmission in MANETs. Journal of King Saud University-Computer and Information Sciences, 29(3), 269–280.

    Article  Google Scholar 

  7. Papaj, J., & Dobos, L. (2016). Cooperation between trust and routing mechanisms for relay node selection in hybrid MANET-DTN. Mobile Information Systems, 2016, 1–18.

    Article  Google Scholar 

  8. Alnumay, W., Ghosh, U., & Chatterjee, P. (2019). A trust-based predictive model for mobile ad hoc network in the internet of things. Sensors, 19(6), 1–14.

    Article  Google Scholar 

  9. Nguyen, D. Q., Toulgoat, M., & Lamont, L. (2016). Impact of trust-based security association and mobility on the delay metric in MANET. Journal of Communications and Networks, 18(1), 105–111.

    Article  Google Scholar 

  10. Pathan, M. S., Zhu, N., He, J., Zardari, Z. A., Memon, M. Q., & Hussain, M. I. (2018). An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet, 10(2), 1–16.

    Google Scholar 

  11. Xia, H., Jia, Yu., Tian, C.-l., Pan, Z.-K., & Sha, E. (2016). Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks. Journal of Network and Computer Applications, 62, 112–127.

    Article  Google Scholar 

  12. Rajkumar, B., & Narsimha, G. (2016). Trust based certificate revocation for secure routing in MANET. Procedia Computer Science, 92, 431–441.

    Article  Google Scholar 

  13. Ali, S. S., & Prasad, B. V. V. S. (2017). Secure and energy aware routing protocol (SEARP) based on trust-factor in Mobile Ad-Hoc networks. Journal of Statistics and Management Systems, 20(4), 543–551.

    Article  Google Scholar 

  14. Xia, H., Li, Z., Zheng, Y., Liu, A., Choi, Y. J., & Sekiya, H. (2018). A novel light-weight subjective trust inference framework in MANETs. IEEE Transactions on Sustainable Computing, 2018, 1–13.

    Google Scholar 

  15. Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180.

    Article  Google Scholar 

  16. Jhaveri, R. H., Patel, N. M., Zhong, Y., & Sangaiah, A. K. (2018). Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT. IEEE Access, 6, 20085–20103.

    Article  Google Scholar 

  17. Mansouri, A., & Bouhlel, M. S. (2019). Trust in ad hoc networks: A new model based on clustering algorithm. IJ Network Security, 21(3), 483–493.

    Google Scholar 

  18. Salehi, M., Boukerche, A., Darehshoorzadeh, A., & Mammeri, A. (2016). Towards a novel trust-based opportunistic routing protocol for wireless networks. Wireless Networks, 22(3), 927–943.

    Article  Google Scholar 

  19. Thorat, S. A., & Kulkarni, P. J. (2017). Uncertainty analysis framework for trust-based routing in MANET. Peer-to-Peer Networking and Applications, 10(4), 1101–1111.

    Article  Google Scholar 

  20. Rao, M., & Singh, N. (2018). Energy efficient QoS aware hierarchical KF-MAC routing protocol in MANET. Wireless Personal Communications, 101(2), 635–648.

    Article  Google Scholar 

  21. Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2019). SecTrust-RPL: A secure trust-aware RPL routing protocol for internet of things. Future Generation Computer Systems, 93, 860–876.

    Article  Google Scholar 

  22. Rajendran, N., Jawahar, P. K., & Priyadarshini, R. (2019). Cross centric intrusion detection system for secure routing over black hole attacks in MANETs. Computer Communications, 148(15), 129–135.

    Article  Google Scholar 

  23. Mohanty, S. N., Ramya, K. C., Rani, S. S., Gupta, D., Shankar, K., Lakshmanaprabu, S. K., et al. (2020). An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy. Future Generation Computer Systems, 102, 1027–1037.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Anitha Josephine.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anitha Josephine, J., Senthilkumar, S. Tanimoto Support Vector Regressive Linear Program Boost Based Node Trust Evaluation for Secure Communication in MANET. Wireless Pers Commun 117, 2973–2993 (2021). https://doi.org/10.1007/s11277-020-07209-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07209-1

Keywords

Navigation